looks like an airplane banner that got loose.
29.05.2025 16:06 β π 2 π 0 π¬ 1 π 0
Exploiting MS-TNAP, 1-click, no prompts.
05.05.2025 19:41 β π 1 π 0 π¬ 0 π 0
Explore our detailed Telnet vulnerability research:
π Guest Bypass: github.com/hackerhouse-...
π Mutual Auth: github.com/hackerhouse-...
π Telnet Client MS-TNAP PoC: github.com/hackerhouse-...
#HackerHouse
05.05.2025 16:51 β π 1 π 0 π¬ 0 π 0
We released three advisories on Microsoft Telnet Server & Client, targeting MS-TNAP vulnerabilities.
1οΈβ£ Guest Restriction Bypass (CVSS 7.5)
2οΈβ£ MS-TNAP Mutual Auth Protocol Issue: Non-exploitable config/protocol issue.
3οΈβ£ Telnet Client PoC: Exposes MS-TNAP risks e.g. phishing.
#Cybersecurity
05.05.2025 16:51 β π 0 π 0 π¬ 1 π 0
Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit github.com/hackerhouse-...
05.05.2025 16:41 β π 2 π 2 π¬ 0 π 0
Not every bug can be a vulnerability and not every vulnerability can be exploited, the MS-TNAP issue I describe exists within the protocol for Telnet authentication using NTLM and partially in the Telnet Server code, but was not fully implemented by Microsoft. PoC's are available for both issues.
30.04.2025 20:17 β π 1 π 0 π¬ 0 π 0
Hacker House exposes flaws in Microsoft Telnet Server! Two advisories reveal a high-severity Guest Access Bypass (CVSS 7.5) in MS-TNAP, risking unauthorized access on Windows 2000 to Server 2008 R2, and an unexploitable NTLM mutual auth issue github.com/hackerhouse-... & github.com/hackerhouse-...
30.04.2025 20:17 β π 1 π 0 π¬ 1 π 0
28.04.2025 22:40 β π 1 π 0 π¬ 0 π 0
Interesting that the cyberbeat journalists wrote multiple news articles about a fake exploit of this recent bug. It's fine though, I almost fell for this AI generated crap too, just like the fake TaskScheduler UAC Bypass you all wrote about. ;-) cyberdom.blog/abusing-the-...
24.04.2025 15:06 β π 0 π 0 π¬ 0 π 0
have you tried turning it off and on again?
24.04.2025 15:02 β π 0 π 0 π¬ 1 π 0
"MSRC didnβt consider a single report as a vulnerability." - is something I agree with, you need the Administrator password to leverage this and whilst Task Scheduler is awesome and tons of fun - you need some kind of boundary violation for this to be an issue. "I have the password" is not one.
22.04.2025 15:47 β π 0 π 0 π¬ 0 π 0
It reads to me as a surface-level analysis of the Task Scheduler implementation with the remarkable realization that "Task Scheduler can run Tasks as other users!" π«’ - I enjoyed the write up but this is a very misleading post.
22.04.2025 15:43 β π 1 π 0 π¬ 1 π 0
Task Schedulerβ New Vulnerabilities for schtasks.exe
UAC bypass, metadata poisoning, and log overflow vulnerabilities in Windows Task Scheduler reveal new tactics for defense evasion and privilege escalation
I found this article interesting, but it isn't technically a UAC bypass - if you have the Administrator username and password, you can authenticate to the host via TaskScheduler by design. The other vulnerabilities were also not really of any value to an attacker. cymulate.com/blog/task-sc...
22.04.2025 15:42 β π 1 π 0 π¬ 1 π 0
DHS Secretary Noemβs purse stolen at Easter dinner with family in D.C.
The theft occurred as Homeland Security Secretary Kristi L. Noem dined with her extended family at the Capital Burger on Seventh Street NW, people familiar with the incident said.
Department of Homeland Security Secretary Kristi L. Noemβs purse was stolen from a downtown Washington restaurant Sunday night, with her passport, DHS badge and about $3,000 cash inside, the department confirmed Monday.
21.04.2025 23:58 β π 724 π 123 π¬ 360 π 74
I was conversing, you unthreaded my comment which is just sad to see.
22.04.2025 14:51 β π 0 π 0 π¬ 0 π 0
I often discuss in my talks about how political bias influences and shapes the technology we build and use. The "underground" of computing technology has typically been right of center which is where many interesting protocols have come from. Internet is healing and people are free to speak again.
22.04.2025 14:46 β π 0 π 0 π¬ 0 π 0
Political-bias on BlueSky is largely left-leaning, it's a comment that "verification" is just an extension of those political biases on display where those who ascribe to particularly agendas and ideologies leverage institutions and systems as power in the society.
22.04.2025 14:44 β π 0 π 0 π¬ 2 π 0
This morning Minnesota Republicans introduced a bill banning mRNA vaccines and labeling them "weapons of mass destruction." It would make manufacturing, possessing or administering them a crime punishable by up to 20 years in prison. www.revisor.mn.gov/bills/bill.p...
21.04.2025 20:01 β π 989 π 456 π¬ 150 π 303
Those who ascribe to extreme-left "woke" ideology.
22.04.2025 14:12 β π 0 π 0 π¬ 1 π 0
The woke do love assigning themselves perceived authority over others.
22.04.2025 14:04 β π 0 π 0 π¬ 1 π 0
facedancer/examples/camera.py at rawgadget2 Β· zhuowei/facedancer
Fork of https://github.com/xairy/Facedancer/tree/rawgadget with patches for testing CVE-2024-53197 - zhuowei/facedancer
Zhuowei Zhang released POC code for CVE-2024-53104, a zero-day used by Cellebrite to unlock Android devices
-patched in February
-used by Serbian law enforcement to unlock the phones of anti-government protesters and journalists
github.com/zhuowei/face...
22.04.2025 11:20 β π 10 π 6 π¬ 0 π 0
Mikrotik "opensesame" SNMP backdoor. Tutorial on how to create a backdoor modelled on EXTRABACON that resets the admin password using a UDP packet (SNMPset) as a post-exploitation technique. github.com/hackerhouse-...
17.04.2025 19:55 β π 3 π 1 π¬ 1 π 0
Mikrotik "opensesame" SNMP backdoor. Tutorial on how to create a backdoor modelled on EXTRABACON that resets the admin password using a UDP packet (SNMPset) as a post-exploitation technique. github.com/hackerhouse-...
17.04.2025 19:55 β π 3 π 1 π¬ 1 π 0
This βCollege Protesterβ Isnβt Real. Itβs an AI-Powered Undercover Bot for Cops
Massive Blue is helping cops deploy AI-powered social media bots to talk to people they suspect are anything from violent sex criminals all the way to vaguely defined βprotesters.β
NEW: A secretive surveillance company is building "AI persona" bots for cops intended to gather evidence on people. Personas include "college protesters," "radicalized" divorced moms, children. We have docs that shows how it works and what cops can do with it:
www.404media.co/this-college...
17.04.2025 13:43 β π 824 π 498 π¬ 34 π 96
Was this exploited by "BadIIS"? Not to my knowledge, but who cares? This fix isn't a good solution as anytime a privileged user or system owner removes "inetpub" they re-expose themselves to this CVE. It's a fix, but an easy one to accidentally undo by careless Admins.
17.04.2025 01:21 β π 1 π 0 π¬ 0 π 0
Forcefully creating the "inetpub" folder prevents an attacker compromising a host pre-deployment, during deployment or a machine that at a later stage has IIS setup or configured - giving them the ability to pollute the web content when they would otherwise have no access todo so
17.04.2025 01:21 β π 1 π 0 π¬ 1 π 0
Democracy Skies in Blueness
Royal United Services Institute for Defence and Security Studies. Founded in 1831, RUSI is the oldest defence and security think tank in the world.
Website π»: https://rusi.org/
WhatsApp π±: https://bit.ly/4h0M5FQ
Engineer /ππ¦/πβοΈ
Work: Cyber Security - Minimise the burden. Optimise for balance. Interested in lots of things.
Ageing hacker, long time documentary photographer. Black Hat Review board. Now sitting on numerous government cyber security boards so I guess that means Iβve grown up right?
Critical Infrastructure & Industrial Security Advisor. Ampyx Cyber CEO. Public speaker. Airport dweller. Recovering regulator. BEERISAC member. CCI US Coordinator. Former SANS Instructor.
#ICS #OT #NERCCIP #NIST #IEC62443 #NIS2 #CRA #SlavaUkraini
Cyber guy. Former NSA cybersecurity director and chief of TAO. Lover of memes. Warning - occasional outrageous Christmas light content.
Network Security Ninja | eJPT | CCNA Student | AWS | Azure | Telecommunications
Blog: www.ha3ks.com
π¬π§ | Senior Threat Intelligence Advisor at Team Cymru | Co-author SANS FOR589 | Co-founder Curated Intel
Cybersecurity/tech reporter @BleepingComputer / serghei.ro
Veteran, dog mom CONVICTED FELON
Pre order my book about being a convicted felon https://www.spiegelandgrau.com/i-am-not-your-enemy
Canary #WindowsInsider who loves finding small changes and bugs.
Feline fan. They/them
Ko-Fi: ko-fi.com/xenopanther
Fearless, adversarial journalism. Join our newsletter to get our best investigative reporting delivered to you: https://theintercept.com/newsletter/
official Bluesky account (check usernameπ)
Bugs, feature requests, feedback: support@bsky.app
Bellingcat is an independent investigative collective of researchers, investigators and citizen journalists brought together by a passion for open source research.
Want to support our charity? bellingcat.com/donate
thedarktangent@defcon.social
CISO of SentinelOne, teaching at Stanford.
knuck if you buck
https://n0.lol
Fuzzing; Vulnerability Research;
Deep Learning; Reverse Engineering
Training & Publications @ http://fuzzing.io
Hacking the planet since 1995
Undercurrents.io BOFH
I'll stop the world and melt with you
KY0LO. Recovering hackademic. He/Him.